Meihua Xiao

Learn More
Gradient Magnetic Field Measurement (GMFM) has been intensively used in Magnetic Resonance Imaging (MRI). In this paper, we introduce GMFM to Pulsed Eddy Current Testing (PECT) in an effort to enhance the PECT sensitivity to subsurface anomalies in stratified conductors. The closed-form expressions of GMFM-based PECT signals have been formulated via the(More)
The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a(More)
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving(More)
Security protocols flaws are notoriously difficult to detect. Comparatively little attention has been given to logics of knowledge, although such logics have been proven to be very useful in the specifications of protocols for communication systems. We address ourselves to the analysis of security protocols under the Dolev-Yao model by using a logic of(More)
This paper explores online learning and batch algorithms for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. A data set has been built including malicious and benign URLs, and data mining system Weka has been used as an aid to classify the existent URLs and new coming URLs and(More)
Localization is very important for the applications in wireless sensor network. For the disadvantage that the accuracy of traditional DV-Hop algorithm is low, this paper proposes an improved DV-Hop localization algorithm named NDV-Hop (Novel improved DV-Hop algorithm). NDV-Hop takes some improvements over DV-Hop from the following aspects: firstly, average(More)
Model checking has been successfully applied to verify the security properties of network protocols. In this paper, we propose a formal modeling method using the PROMELA language based on simplified model of SET payment protocol proposed by Lu & Smolka, and use LTL to describe authentication property. Under the hypothesis of the network environment being(More)
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically(More)
To precisely understand human gaze behaviors in three-party conversations, this work is dedicated to look into whether the speaker can be reliably identified from the interlocutors in a three-party conversation on the basis of the interactive behaviors of eye contact, where speech signals are not provided. Derived from a pre-recorded, multimodal, and(More)
  • 1